2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)最新文献

筛选
英文 中文
Security of Industrial Wireless Sensor Networks: A review 工业无线传感器网络的安全:综述
S. J., Suresh Kv, D. Tandur
{"title":"Security of Industrial Wireless Sensor Networks: A review","authors":"S. J., Suresh Kv, D. Tandur","doi":"10.1109/ITACT.2015.7492658","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492658","url":null,"abstract":"Industrial wireless sensor networks have attracted widespread attention recently. This is attributable to their inherent advantage over the traditional wired systems mainly in terms of ease in scaling and redeployment of the network. Wireless sensor networks can also be deployed in remote and hard to reach locations. However security is always a concern when wireless devices are involved. Relatively easier eavesdropping when compared to a wired system can make the communication network vulnerable to security attacks. Thus the security of Industrial Wireless Sensor Networks (IWSNs) is vital. An overview of the major requirements and security issues related to IWSNs are presented in this article. We focus on cryptographic and chaos based algorithms that can be considered as possible solutions in sensor networks.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126237853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparative study of PID and SMC controller for nonlinear unmanned ground all terrain vehicle 非线性无人地面全地形车PID与SMC控制器的比较研究
Piyush N. Dave, J. Patil
{"title":"A comparative study of PID and SMC controller for nonlinear unmanned ground all terrain vehicle","authors":"Piyush N. Dave, J. Patil","doi":"10.1109/ITACT.2015.7492693","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492693","url":null,"abstract":"An unmanned ground all terrain vehicle (UGATV) can moves across the any surface of the ground (terrain) without intervention of human. It is autonomous in nature and it should be capable of operating over a wide variety of terrain, operating conditions. Hence selection of appropriate controller is require. In this paper, PID and SMC controller for UGATV is designed and is implemented in MATLAB environment. Thereafter performance of UGATV with PID controller and UGATV with SMC is compared for different disturbances such as sudden break (obstacle), change in mass of UGATV, change of slope of road (terrain). These controllers are designed using linearized transfer function then applied to nonlinear model of UGATV. Simulation results are generated for various transient conditions and disturbance levels.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance evaluation of star, tree & mesh optical network topologies using optimized Raman - EDFA Hybrid Optical Amplifier 基于优化Raman - EDFA混合光放大器的星形、树形和网状光网络拓扑性能评估
Rajpreet Singh, Sanjeev Dewra
{"title":"Performance evaluation of star, tree & mesh optical network topologies using optimized Raman - EDFA Hybrid Optical Amplifier","authors":"Rajpreet Singh, Sanjeev Dewra","doi":"10.1109/ITACT.2015.7492667","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492667","url":null,"abstract":"Performance at 15 Gbps of Phase Modulated signals for Star, tree and mesh optical network topologies are investigated using optimized Raman-EDFA Hybrid Optical Amplifier. Number of the users carried out is calculated by the consideration of the signal's Quality factor and received signal power. In all the three topologies, the performance is evaluated in terms of number of users at different input signal powers. In all these three topologies, the signals used are generated at 90° phase deviation. The channel spacing is taken as 0.1 THz with 1MHz line width. The minimum input signal power for all the topologies is -60 dBm. Mesh topology provides better results in terms of Quality Factor within acceptable range of 16.4621-28.9058 and provides output power 12.472dBm at each receiver whereas star topology supports 14 users within acceptable quality factor range of 7.60899-32.1223 with output signal power of 12.600dBm at each receiver and tree topology supports 16 users within acceptable quality factor range of 8.82762-9.08396 with output signal power of 12.591dBm at each receiver.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133349889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Bench marking of classification algorithms: Decision Trees and Random Forests - a case study using R 分类算法的基准测试:决策树和随机森林-使用R的案例研究
Manish Varma Datla
{"title":"Bench marking of classification algorithms: Decision Trees and Random Forests - a case study using R","authors":"Manish Varma Datla","doi":"10.1109/ITACT.2015.7492647","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492647","url":null,"abstract":"Decision Trees and Random Forests are leading Machine Learning Algorithms, which are used for Classification purposes. Through the course of this paper, a comparison is made of classification results of these two algorithms, for classifying data sets obtained from Kaggle's Bike Sharing System and Titanic problems. The solution methodology deployed is primarily broken into two segments. First, being Feature Engineering where the given instance variables are made noise free and two or more variables are used together to give rise to a valuable third. Secondly, the classification parameters are worked out, consisting of correctly classified instances, incorrectly classified instances, Precision and Accuracy. This process ensured that the instance variables and classification parameters were best treated before they were deployed with the two algorithms i.e. Decision Trees and Random Forests. The developed model has been validated by using Systems data and the Classification results. From the model it can safely be concluded that for all classification problems Decision Trees is handy with small data sets i.e. less number of instances and Random Forests gives better results for the same number of attributes and large data sets i.e. with greater number of instances. R language has been used to solve the problem and to present the results.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127331044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multiple human tracking based on Daubechies Complex Wavelet Transform combined with histogram of templates features 基于Daubechies复小波变换结合模板直方图特征的多人跟踪
S. R, H. S. Jayanna, Ramegowda
{"title":"Multiple human tracking based on Daubechies Complex Wavelet Transform combined with histogram of templates features","authors":"S. R, H. S. Jayanna, Ramegowda","doi":"10.1109/ITACT.2015.7492675","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492675","url":null,"abstract":"In video processing, tracking objects that are in motion has attracted lot of interest of the researchers all over the world. In numerous computer vision applications, such as monitoring traffic, remote video surveillance automation, human tracking, etc, moving object detection in video sequence is the major step of knowledge extraction. In this paper, an effective human tracking system based on Daubechies Complex Wavelet Transform (DaubCxWT) combined with histogram of template is introduced. This transform is suitable to track a person in video sequences because of its approximate shift-invariance nature. Initially, DaubCxWT co-efficients associated to the person are computed. Then, in Daubechies complex wavelet domain, the energy of these co-efficients is compared to the neighbouring object, to carry out tracking in the consecutive frames. Histogram of template feature is used to extract the texture and gradient information for the human detected. Daubechies Complex Wavelet co-efficients and histogram of template features are combined to form feature vector. In order to build feature vector for every pixel in that area, the calculated co-efficients are utilised. Further, by making use of the generated feature vectors inside an adaptive search window, optimal search for the best match is performed. Search window adaption is employed to estimate the speed and direction of the person, in motion. This method has shown appreciable results.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131119614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for Sentimental Analysis and Opinion Mining based on SentiWordNet using web data 基于SentiWordNet的情感分析与意见挖掘新方法
Shoiab Ahmed, A. Danti
{"title":"A novel approach for Sentimental Analysis and Opinion Mining based on SentiWordNet using web data","authors":"Shoiab Ahmed, A. Danti","doi":"10.1109/ITACT.2015.7492646","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492646","url":null,"abstract":"Opinion mining is an art of tracking the mood of the public about a particular product or topic from a huge set of opinions or reviews publically available in web. In this work, a novel approach is proposed based on SentiWordNet, which generates count of score words into seven categories such as strong-positive, positive, weak-positive, neutral, weak-negative, negative and strong-negative words for the opinion mining task and evaluated using machine learning algorithms like Naïve Bayes, SVM and Multilayer Perception (MLP). The web data is collected using web crawler applied with different pre-processing techniques which include removal of stop-words from online reviews, then stemming is performed using Porter Stemmer algorithm, and then reviews are tagged using Stanford POS tagger. The proposed approach is experimented on movie and product web domains and obtained higher success rate in terms of accuracy measured by various tools like Kappa statistics with an accuracy of 77.7% and has lower error rates. Weighted average of different accuracy measures like Precision, Recall, TP Rate, F-Measure rate depicts higher efficiency rate and lower FP Rate for Naïve Bayes and MLP models. The experimental results of Ten-Fold cross validation on the training data shows that Naïve Bayes & MLP outperforms the SVM model. Thus, the former are used for the Sentimental Analysis of web data. The results demonstrate that the proposed novel approach has higher efficacy and it can be successfully used in Opinion Mining for the task of decision making by any web user.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134193868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Comparative analysis of Kannada phoneme recognition using different classifiers 不同分类器对卡纳达语音位识别的比较分析
A. S., R. Kumaraswamy
{"title":"Comparative analysis of Kannada phoneme recognition using different classifiers","authors":"A. S., R. Kumaraswamy","doi":"10.1109/ITACT.2015.7492683","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492683","url":null,"abstract":"Information retrieval from audio and speech is very important in the present digital world. Phonetic search (phoneme level search) is an efficient technique for searching words or phrases from audio and speech recordings. In this paper, a baseline phoneme recognition system for Kannada language is developed using Deep Belief Networks (DBNs). Phonemes are segmented from broadcast/read mode Kannada speech. 16 MFCC features are extracted from each speech frame. These features are used as input to the recognizer. DBNs are relatively new area of machine learning. The learning procedure of DBN has two steps, an unsupervised pre-training stage and fine-tuning stage. The performance of DBN for recognition of 25 Kannada phonemes is compared with the conventional methods of speech recognition such as, Multi-Layer Feed Forward Neural Networks (ML-FFNNs) and Support Vector Machines (SVMs). Experimental results show that DBNs yield a high performance as compared to other techniques with Phoneme Error Rate (PER) of 23.6 %. In another experiment conducted, shows that DBN's performance is influenced by number of hidden units in the hidden layer chosen.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122954026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A rechargeable framework for improving throughput in wireless sensor network 一种提高无线传感器网络吞吐量的可充电框架
R. N, P. Tijare, M. Aparna
{"title":"A rechargeable framework for improving throughput in wireless sensor network","authors":"R. N, P. Tijare, M. Aparna","doi":"10.1109/ITACT.2015.7492657","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492657","url":null,"abstract":"Energy efficiency in WSN is a tricky problem. Charging sensor networks using wireless technology has become an effective way of improving throughput in the network as the sensor nodes are battery powered. In this paper we are proposing a framework which improves the efficiency of the network using electrical vehicles known as Sencars. The sensor nodes get charged based on optimal energy conditions. An experimental and simulated result has shown the efficiency of network in terms of throughput, packet delivery fraction and other metrics of importance.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129302242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Post-processing methodology for word level Telugu character recognition systems using Unicode Approximation Models 使用Unicode近似模型的词级泰卢固语字符识别系统的后处理方法
N. Rani, T. Vasudev
{"title":"Post-processing methodology for word level Telugu character recognition systems using Unicode Approximation Models","authors":"N. Rani, T. Vasudev","doi":"10.1109/ITACT.2015.7492681","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492681","url":null,"abstract":"Digitization and automatic interpretation of document images into editable document format is the primary inclination of optical character recognition systems (OCR). This paper proposes a novel technique for resolution of post processing errors that occurs with respect to Telugu OCR using word level Unicode Approximation Models (UAM) through a mapper module. The mapper module performs the word level one-one mapping of assigning a sequence of recognized class labels to appropriate UAM. The sequence of recognized class labels are related to one particular word and are generated from the classifier as output. The proposed algorithm effectively resolves the problem of segmentation errors, preprocessing errors like cuts and merges in characters, noise, occlusions, semantic ordering and confusing character classes. The proposed UAM models provide adequate and consistent accuracies of around 96.2% for printed words and 91.7% towards handwritten words respectively.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile admittance of health information with privacy and analysis in telemedicine 远程医疗中健康信息隐私的移动准入及分析
V. Arun, S. Padma, V. Shyam
{"title":"Mobile admittance of health information with privacy and analysis in telemedicine","authors":"V. Arun, S. Padma, V. Shyam","doi":"10.1109/ITACT.2015.7492655","DOIUrl":"https://doi.org/10.1109/ITACT.2015.7492655","url":null,"abstract":"Telemedicine involves many people at many levels with potential access to health records or medical data or the health details of a particular person. Privacy and security have always been an issue in telemedicine. In order to overcome this problem, cloud has been adopted to store and securely access data. Cloud offers a way to allow medical data and images to be transferred from patient to medical clinicians providing security. But individual patient data is not provided with privacy when it is outsourced to public cloud. In this paper, using a case study of screening the masses for early detection of non-communicable diseases at Sri Kshetra Suttur, privacy is built into telemedicine or mobile health care system with the help of the private cloud. Efficient key generation, Encryption, Decryption and analysis of health data misuse by authenticating authorized Clinicians to access patient records using Paillier Cryptosystem and Searchable Symmetric Encryption are some of the salient features introduced in this paper.","PeriodicalId":336783,"journal":{"name":"2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124105948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信